Judge rules lawsuit claiming Apple broke FaceTime can proceed

Apple was hit with a lawsuit earlier this year that claims the company purposefully broke FaceTime on iOS 6 in order to push people to upgrade to iOS 7. And as of late last week, Apple failed to get the suit dismissed as District Judge Lucy Koh ruled that iPhone 4 and 4S users can pursue claims against Apple.

The whole situation is a result of Apple wanting to reduce the cost of using third-party servers to manage FaceTime calls. Doing so was costing the company millions of dollars per month in fees, so with iOS 7, Apple changed the way FaceTime functioned so that the third-party servers weren’t used as often. However, users of iPhone 4s and 4Ss were still using iOS 6 so, allegedly, Apple let a security certificate lapse in order to break FaceTime for iOS 6 and force customers to upgrade their operating systems.

In its attempt to get rid of the lawsuit, Apple claimed that users didn’t suffer economic loss because FaceTime is free. But in her decision, Koh said, “Plaintiffs paid for their iPhones, and FaceTime is a ‘feature’ of the iPhone and thus a component of the iPhone’s cost. Indeed, Apple advertised FaceTime as “one more thing that makes an iPhone an iPhone.”

Apple also tried to argue that iPhone users weren’t entitled to FaceTime service saying that the Plaintiffs “have no right to uninterrupted, continuous, or error-free” FaceTime. To which, Judge Koh responded, “Plaintiffs do not allege that FaceTime operation was interrupted, or that it contained errors. Rather Plaintiffs allege that Apple in effect made FaceTime unavailable to owners of iPhone 4 and 4S devices…The unavailability of FaceTime is different from ‘interruptions’ or ‘errors’ in FaceTime.”

The plaintiffs are seeking both loss and punitive damages in amounts that will be determined at trial.

Via: Reuters

Source: District Court Decision

Engadget RSS Feed

Florida court rules police can demand your phone’s passcode

A Florida man arrested for third-degree voyeurism using his iPhone 5 initially gave police verbal consent to search the smartphone, but later rescinded permission before divulging his 4-digit passcode. Even with a warrant, they couldn’t access the phone without the combination. A trial judge denied the state’s motion to force the man to give up the code, considering it equal to compelling him to testify against himself, which would violate the Fifth Amendment. But the Florida Court of Appeals’ Second District reversed that decision today, deciding that the passcode is not related to criminal photos or videos that may or may not exist on his iPhone.

Obviously, this has implications for Constitutional protections of a civilian’s data contained behind a smartphone’s multi-digit passcode. Previously, a 2014 decision by the Virginia Beach Circuit Court found that individuals can’t be compelled to give up their phone’s code, but they could be forced to unlock it with a fingerprint, should that option be available.

The distinction? A passcode requires a person to divulge actual knowledge, while a fingerprint is considered physical evidence, like a handwriting sample or DNA. This interpretation sources back to the Supreme Court’s 1988 Doe v. U.S. decision, in which it ruled that a person may be compelled to give up a key to a strongbox, say, but not a combination to a wall safe.

The three-judge Appeals Court panel in Florida disagreed with this distinction. They also found the comparison out of step with the current state of technology, such that providing the passcode would not be as similarly self-incriminating as directly giving the authorities evidential documents. Further, the police were beyond probable cause of searching suspect Aaron Stahl’s code-locked phone, as Judge Anthony Black wrote for his fellows in the court’s decision:

“Moreover, although the passcode would allow the State access to the phone, and therefore to a source of potential evidence, the State has a warrant to search the phone—the source of evidence had already been uncovered … Providing the passcode does not “betray any knowledge [Stahl] may have about the circumstances of the offenses” for which he is charged.”

Black clarified what kind of foreknowledge authorities would need to possess to compel someone to divulge their phone’s passcode:

“In order for the foregone conclusion doctrine to apply, the State must show with reasonable particularity that, at the time it sought the act of production, it already knew the evidence sought existed, the evidence was in the possession of the accused, and the evidence was authentic … Although the State need not have “perfect knowledge” of the requested evidence, it “must know, and not merely infer,” that the evidence exists, is under the control of defendant, and is authentic.”

Via: The Daily Dot

Source: Courthouse News

Engadget RSS Feed